(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Abstract

Disclosed is a system which has double password. One is genuine, the other is fake. This system is secure from illegal access.

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
53% of the total text.

Page 1 of 2

Double password system

The system itself is for general purpose, but to clarify its merit, the following description is the one for bank accounts.

Recently, there are many cases in which criminals illegally withdraw money from bank accounts. This disclosure depicts a system to prevent such cases. The client, establishing an account at a bank, assigns two passwords. One is genuine, and the other is fake. It is recommended that the former is hardly guessable, the latter EASILY guessable such as the date of birth.

When the genuine password is entered, the system functions normally.

When the fake password is entered, the system functions normally, but in addition, a background routine runs.

The background routine might execute some measures for security.

The following chart explains the system functions.

Video system attatched to ATM booth

Account DB

(1) The system, as an ordinary on-line system, consists of ATM and the Center system. ATM and the Center system are connected by a line. ATM is also connected to the Security agency. In the account DB, account No., genuine password (PWD_G), and fake password (PWD_F:for crime prevention) are registered. In addition if the system support the upper limit for withdrawal for a day, this value (WUL) is also registered. (*1)(2)

When an account No. and a password are keyed-in, the system checks the password. If it is PWD_G or PWD_F, the normal withdrawal routine runs and sends deposit order to the ATM. Even if the password is PWD_F, the person at ATM (criminal) does not notice that it is fak...